id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2021-1113 | NVIDIA camera firmware contains a difficult to exploit vulnerability where a highly privileged attacker can cause unauthorized modification to camera resources, which may result in complete denial of service and partial loss of data integrity for all clients. | [
"cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_agx_xavier:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_nano:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_nano_2gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:*:*:*:*:*:*"
]
| null | 4.7 | null | null |
|
CVE-2022-40206 | WordPress wpForo Forum plugin <= 2.0.5 - Insecure direct object references (IDOR) vulnerability | Insecure direct object references (IDOR) vulnerability in the wpForo Forum plugin <= 2.0.5 on WordPress allows attackers with subscriber or higher user roles to mark any forum post as private/public. | [
"cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:*"
]
| null | 6.3 | null | null |
CVE-2024-52517 | Nextcloud Server's global credentials of external storages are sent back to the frontend | Nextcloud Server is a self hosted personal cloud system. After storing "Global credentials" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1. | [
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*"
]
| null | 4.6 | null | null |
GHSA-69c6-ccv7-v3g3 | A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user. | []
| null | 9.8 | null | null |
|
GHSA-x4hp-q863-hc8m | An issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it is possible to download files that are not certificates. These files could be much larger than what one would expect to download, leading to Resource Exhaustion. This is fixed in 16.25.2, 18.11.2, and 19.3.2. | []
| null | 7.5 | null | null |
|
GHSA-2j8v-qwfq-3xj9 | PHP remote file inclusion vulnerability in socios/maquetacion_socio.php (members/maquetacion_member.php) in Ciberia Content Federator 1.0 allows remote attackers to execute arbitrary PHP code via the path parameter. NOTE: some of these details are obtained from third party information. | []
| null | null | null | null |
|
GHSA-5c75-q5qv-27px | Missing input validation in the ORing IAP-420 web-interface allows Cross-Site Scripting (XSS).This issue affects IAP-420 version 2.01e and below. | []
| 7.1 | null | null | null |
|
CVE-2014-5819 | The PHONE for Google Voice & GTalk (aka com.moplus.gvphone) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:mopl:phone_for_google_voice_\\&_gtalk:1.0.6:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
CVE-2005-2341 | Heap-based buffer overflow in Research in Motion (RIM) BlackBerry Attachment Service allows remote attackers to cause a denial of service (hang) via an e-mail attachment with a crafted TIFF file. | [
"cpe:2.3:a:rim:blackberry_attachment_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rim:blackberry_enterprise_server:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2022-26100 | SAPCAR - version 7.22, does not contain sufficient input validation on the SAPCAR archive. As a result, the SAPCAR process may crash, and the attacker may obtain privileged access to the system. | [
"cpe:2.3:a:sap:sapcar:7.22:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-vqr5-973r-9c8r | A vulnerability was found in SourceCodester Expense Management System. It has been rated as critical. This issue affects the function fetch_report_credit of the file report.php of the component POST Parameter Handler. The manipulation of the argument from/to leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-205811. | []
| null | 9.8 | null | null |
|
CVE-2012-6007 | Cross-site scripting (XSS) vulnerability in screens/base/web_auth_custom.html on Cisco Wireless LAN Controller (WLC) devices with software 7.2.110.0 allows remote authenticated users to inject arbitrary web script or HTML via the headline parameter, aka Bug ID CSCud65187, a different vulnerability than CVE-2012-5992. | [
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.2.110.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:2000_wireless_lan_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:2100_wireless_lan_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:2500_wireless_lan_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4100_wireless_lan_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4400_wireless_lan_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:5500_wireless_lan_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7500_wireless_lan_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8500_wireless_lan_controller:-:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-gc8p-pp2v-4pm5 | Cross-site scripting (XSS) vulnerability in system/classes/login.php in ContentLion Alpha 1.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. | []
| null | null | null | null |
|
CVE-2014-6054 | The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message. | [
"cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2009-2473 | neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564. | [
"cpe:2.3:a:webdav:neon:0.28.6:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-ph32-jw9m-pm23 | The affected TBox RTUs are missing authorization for running some API commands. An attacker running these commands could reveal sensitive information such as software versions and web server file contents. | []
| null | 5.3 | null | null |
|
CVE-2015-0237 | Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain. | [
"cpe:2.3:a:redhat:enterprise_virtualization_manager:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2009-3390 | Multiple unspecified vulnerabilities in the (1) iscsiadm and (2) iscsitadm programs in Sun Solaris 10, and OpenSolaris snv_28 through snv_109, allow local users with certain RBAC execution profiles to gain privileges via unknown vectors related to the libima library. | [
"cpe:2.3:o:sun:opensolaris:snv_28:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_29:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_30:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_31:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_32:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_33:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_34:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_35:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_36:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_37:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_38:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_39:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_40:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_41:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_42:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_43:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_44:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_45:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_46:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_104:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_106:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_108:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_109:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_36:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_104:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_106:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_107:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_108:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_109:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2022-32618 | In typec, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262454; Issue ID: ALPS07262454. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
]
| null | 6.8 | null | null |
|
RHSA-2016:0702 | Red Hat Security Advisory: java-1.7.0-ibm security update | JDK: buffer overflow vulnerability in the IBM JVM JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) OpenJDK: non-constant time GCM authentication tag comparison (JCE, 8143945) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
]
| null | null | null | null |
CVE-2022-43937 | Brocade SANnav Information Disclosure Vulnerability | Possible information exposure through log file vulnerability where sensitive fields are recorded in the debug-enabled logs when debugging is turned on in Brocade SANnav before 2.3.0 and 2.2.2a | []
| null | 5.7 | null | null |
GHSA-jrwx-pqpc-96qx | Cross-Site Request Forgery (CSRF) vulnerability in captcha.soft Image Captcha allows Cross Site Request Forgery. This issue affects Image Captcha: from n/a through 1.2. | []
| null | 4.3 | null | null |
|
GHSA-3p26-2mwr-qg2w | Genie Access WIP3BVAF WISH IP 3MP IR Auto Focus Bullet Camera devices through 3.x are vulnerable to directory traversal via the web interface, as demonstrated by reading /etc/shadow. NOTE: this product is discontinued, and its final firmware version has this vulnerability (4.x versions exist only for other Genie Access products). | []
| null | null | 7.5 | null |
|
GHSA-vpv3-r9v6-rh28 | A use-after-free vulnerability with the frameloader during tree reconstruction while regenerating CSS layout when attempting to use a node in the tree that no longer exists. This results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2. | []
| null | null | 9.8 | null |
|
GHSA-cgq7-qm8c-765v | The Web Server component of TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management contains easily exploitable vulnerabilities that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using these vulnerabilities requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management: versions 6.1.0 and below. | []
| null | 5.4 | null | null |
|
GHSA-p59q-w6ff-wf6f | Adminer and AdminerEvo are vulnerable to SSRF via database connection fields. This could allow an unauthenticated remote attacker to enumerate or access systems the attacker would not otherwise have access to. Adminer is no longer supported, but this issue was fixed in AdminerEvo version 4.8.4. | []
| null | null | null | null |
|
RHSA-2020:0981 | Red Hat Security Advisory: ipmitool security update | ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.1 | null | null |
CVE-2024-26894 | ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() | In the Linux kernel, the following vulnerability has been resolved:
ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
After unregistering the CPU idle device, the memory associated with
it is not freed, leading to a memory leak:
unreferenced object 0xffff896282f6c000 (size 1024):
comm "swapper/0", pid 1, jiffies 4294893170
hex dump (first 32 bytes):
00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace (crc 8836a742):
[<ffffffff993495ed>] kmalloc_trace+0x29d/0x340
[<ffffffff9972f3b3>] acpi_processor_power_init+0xf3/0x1c0
[<ffffffff9972d263>] __acpi_processor_start+0xd3/0xf0
[<ffffffff9972d2bc>] acpi_processor_start+0x2c/0x50
[<ffffffff99805872>] really_probe+0xe2/0x480
[<ffffffff99805c98>] __driver_probe_device+0x78/0x160
[<ffffffff99805daf>] driver_probe_device+0x1f/0x90
[<ffffffff9980601e>] __driver_attach+0xce/0x1c0
[<ffffffff99803170>] bus_for_each_dev+0x70/0xc0
[<ffffffff99804822>] bus_add_driver+0x112/0x210
[<ffffffff99807245>] driver_register+0x55/0x100
[<ffffffff9aee4acb>] acpi_processor_driver_init+0x3b/0xc0
[<ffffffff990012d1>] do_one_initcall+0x41/0x300
[<ffffffff9ae7c4b0>] kernel_init_freeable+0x320/0x470
[<ffffffff99b231f6>] kernel_init+0x16/0x1b0
[<ffffffff99042e6d>] ret_from_fork+0x2d/0x50
Fix this by freeing the CPU idle device after unregistering it. | []
| null | 6 | null | null |
GHSA-f5rw-5wqh-76m9 | Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters. | []
| null | 5.4 | null | null |
|
GHSA-q3r7-7jgj-hp9p | Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff. | []
| null | null | null | null |
|
RHSA-2024:7431 | Red Hat Security Advisory: kpatch-patch-5_14_0-284_52_1 and kpatch-patch-5_14_0-284_79_1 security update | kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | [
"cpe:/o:redhat:rhel_eus:9.2::baseos"
]
| null | 7.8 | null | null |
CVE-2019-15339 | The Lava Z60s Android device with a build fingerprint of LAVA/Z60s/Z60s:8.1.0/O11019/1530331229:user/release-keys contains a pre-installed app with a package name of com.android.lava.powersave app (versionCode=400, versionName=v4.0.27) that allows any app co-located on the device to programmatically disable and enable Wi-Fi without the corresponding access permission through an exported interface. | [
"cpe:2.3:o:lavamobiles:z60s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lavamobiles:z60s:-:*:*:*:*:*:*:*"
]
| null | 3.3 | null | 2.1 |
|
CVE-2020-14067 | The install_from_hash functionality in Navigate CMS 2.9 does not consider the .phtml extension when examining files within a ZIP archive that may contain PHP code, in check_upload in lib/packages/extensions/extension.class.php and lib/packages/themes/theme.class.php. | [
"cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2014-10026 | index.cgi in D-Link DAP-1360 with firmware 2.5.4 and earlier allows remote attackers to bypass authentication and obtain sensitive information by setting the client_login cookie to admin. | [
"cpe:2.3:o:dlink:dap-1360_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dap-1360:-:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2015-0611 | The administrative web-management portal in Cisco IX 8 (.0.1) and earlier on Cisco TelePresence IX5000 devices does not properly restrict the device-recovery account's access, which allows remote authenticated users to obtain HelpDesk-equivalent privileges by leveraging device-recovery authentication, aka Bug ID CSCus74174. | [
"cpe:2.3:o:cisco:telepresence_system_software_ix:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:telepresence_system_software_ix:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_ix5000:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_ix5200:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.5 |
|
CVE-2016-10072 | WampServer 3.0.6 has two files called 'wampmanager.exe' and 'unins000.exe' with a weak ACL for Modify. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. To properly exploit this vulnerability, the local attacker must insert an executable file called wampmanager.exe or unins000.exe and replace the original files. The next time one of these programs is launched by a more privileged user, malicious code chosen by the local attacker will run. NOTE: the vendor disputes the relevance of this report, taking the position that a configuration in which "'someone' (an attacker) is able to replace files on a PC" is not "the fault of WampServer. | [
"cpe:2.3:a:wampserver:wampserver:3.0.6:*:*:*:*:*:*:*"
]
| null | 5.3 | 7.5 | 6.9 |
|
GHSA-5r8j-f593-7fqq | Buffer overflow in DSC 3.0 parser from GSview, as used in KGhostView in KDE 1.1 and KDE 3.0.3a, may allow attackers to cause a denial of service or execute arbitrary code via a modified .ps (PostScript) input file. | []
| null | null | null | null |
|
GHSA-jchx-5q5h-f574 | ** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in Drupal 7.12 and earlier allows remote attackers to hijack the authentication of arbitrary users for requests that end a session via the user/logout URI. NOTE: the vendor disputes the significance of this issue, by considering the "security benefit against platform complexity and performance impact" and concluding that a change to the logout behavior is not planned because "for most sites it is not worth the trade-off." | []
| null | null | null | null |
|
CVE-2018-1281 | The clustered setup of Apache MXNet allows users to specify which IP address and port the scheduler will listen on via the DMLC_PS_ROOT_URI and DMLC_PS_ROOT_PORT env variables. In versions older than 1.0.0, however, the MXNet framework will listen on 0.0.0.0 rather than user specified DMLC_PS_ROOT_URI once a scheduler node is initialized. This exposes the instance running MXNet to any attackers reachable via the interface they didn't expect to be listening on. For example: If a user wants to run a clustered setup locally, they may specify to run on 127.0.0.1. But since MXNet will listen on 0.0.0.0, it makes the port accessible on all network interfaces. | [
"cpe:2.3:a:apache:mxnet:*:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
GHSA-78j5-gcmf-vqc8 | Cross-Site Scripting (XSS) in Verdaccio | ImpactWhat kind of vulnerability is it? Who is impacted?Cross-Site Scripting XSS, malicious packages with content Javascript that might be executed in the User Interface stealing user credentials.PatchesHas the problem been patched? What versions should users upgrade to?Users that still using `v3` must upgrade to **>3.12.0** or those have no problem to migrate to a major version **>=4.0.0** also fix the issue.WorkaroundsIs there a way for users to fix or remediate the vulnerability without upgrading?No, the users must update.ReferencesAre there any links users can visit to find out more?https://www.npmjs.com/advisories/832
https://www.npmjs.com/advisories/833The issue was reported by the NPMJS Security TeamFor more informationIf you have any questions or comments about this advisory:Read the Security Policy to find the ways to be in contact with us. | []
| null | null | 6.1 | null |
CVE-2017-5216 | Stack-based buffer overflow vulnerability in Netop Remote Control versions 11.53, 12.21 and prior. The affected module in the Guest client is the "Import to Phonebook" option. When a specially designed malicious file containing special characters is loaded, the overflow occurs. 12.51 is the fixed version. The Support case ref is 00109744. | [
"cpe:2.3:a:netop:remote_control:*:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 4.3 |
|
CVE-2023-26253 | In Gluster GlusterFS 11.0, there is an xlators/mount/fuse/src/fuse-bridge.c notify stack-based buffer over-read. | [
"cpe:2.3:a:gluster:glusterfs:11.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-938x-7pc2-p2gg | Directory traversal vulnerability in the inertialFATE iF Portfolio Nexus (com_if_nexus) component 1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. | []
| null | null | null | null |
|
ICSA-25-191-10 | End-of-Train and Head-of-Train Remote Linking Protocol | The protocol used for remote linking over RF for End-of-Train and Head-of-Train (also known as a FRED) relies on a BCH checksum for packet creation. It is possible to create these EoT and HoT packets with a software defined radio and issue brake control commands to the EoT device, disrupting operations or potentially overwhelming the brake systems. | []
| null | 8.1 | null | null |
CVE-2015-4036 | Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:rc7:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2021-33844 | A floating point exception (divide-by-zero) issue was discovered in SoX in functon startread() of wav.c file. An attacker with a crafted wav file, could cause an application to crash. | [
"cpe:2.3:a:sox_project:sox:14.4.2-7:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2020-21322 | An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file. | [
"cpe:2.3:a:feehi:feehicms:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-v5rr-334g-rqm6 | Endian Firewall Community (aka EFW) 3.3.2 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in a backup comment. | []
| null | 8.8 | null | null |
|
CVE-2017-6866 | A vulnerability was discovered in Siemens XHQ server 4 and 5 (4 before V4.7.1.3 and 5 before V5.0.0.2) that could allow an authenticated low-privileged remote user to gain read access to data in the XHQ solution exceeding his configured permission level. | [
"cpe:2.3:a:siemens:xhq_server:*:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
CVE-2016-5933 | IBM Tivoli Monitoring 6.2 and 6.3 is vulnerable to possible host header injection attack that could lead to HTTP cache poisoning or firewall bypass. IBM Reference #: 1997223. | [
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:*:*:*:*:*:*:*"
]
| null | null | 4.6 | 4.9 |
|
GHSA-grc2-9626-m7hh | A vulnerability, which was classified as critical, was found in code-projects Blood Bank System up to 1.0. Affected is an unknown function of the file /admin/massage.php. The manipulation of the argument bid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 5.1 | 4.7 | null | null |
|
PYSEC-2021-125 | null | A flaw was found in Ansible where the secret information present in async_files are getting disclosed when the user changes the jobdir to a world readable directory. Any secret information in an async status file will be readable by a malicious user on that system. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2. | []
| null | null | null | null |
CVE-2023-46455 | In GL.iNET GL-AR300M routers with firmware v4.3.7 it is possible to write arbitrary files through a path traversal attack in the OpenVPN client file upload functionality. | [
"cpe:2.3:h:gl.inet:ar300m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ar300m:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2012-3308 | Cross-site scripting (XSS) vulnerability in IBM Sametime 8.0.2 through 8.5.2.1 allows remote attackers to inject arbitrary web script or HTML via an IM chat. | [
"cpe:2.3:a:ibm:sametime:8.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-hx4j-3826-jwrv | In (TBD) of (TBD), there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239872581References: N/A | []
| null | 6.7 | null | null |
|
GHSA-wq5x-hgvh-f6jv | A vulnerability, which was classified as critical, has been found in rmountjoy92 DashMachine 0.5-4. Affected by this issue is some unknown functionality of the file /settings/delete_file. The manipulation of the argument file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-248258 is the identifier assigned to this vulnerability. | []
| null | 4.6 | null | null |
|
CVE-1999-0337 | AIX batch queue (bsh) allows local and remote users to gain additional privileges when network printing is enabled. | [
"cpe:2.3:o:ibm:aix:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2022-41279 | A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition. | [
"cpe:2.3:a:siemens:jt2go:-:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
]
| null | 3.3 | null | null |
|
RHSA-2015:1793 | Red Hat Security Advisory: qemu-kvm security fix update | Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
CVE-2009-0772 | The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2024-50139 | KVM: arm64: Fix shift-out-of-bounds bug | In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: Fix shift-out-of-bounds bug
Fix a shift-out-of-bounds bug reported by UBSAN when running
VM with MTE enabled host kernel.
UBSAN: shift-out-of-bounds in arch/arm64/kvm/sys_regs.c:1988:14
shift exponent 33 is too large for 32-bit type 'int'
CPU: 26 UID: 0 PID: 7629 Comm: qemu-kvm Not tainted 6.12.0-rc2 #34
Hardware name: IEI NF5280R7/Mitchell MB, BIOS 00.00. 2024-10-12 09:28:54 10/14/2024
Call trace:
dump_backtrace+0xa0/0x128
show_stack+0x20/0x38
dump_stack_lvl+0x74/0x90
dump_stack+0x18/0x28
__ubsan_handle_shift_out_of_bounds+0xf8/0x1e0
reset_clidr+0x10c/0x1c8
kvm_reset_sys_regs+0x50/0x1c8
kvm_reset_vcpu+0xec/0x2b0
__kvm_vcpu_set_target+0x84/0x158
kvm_vcpu_set_target+0x138/0x168
kvm_arch_vcpu_ioctl_vcpu_init+0x40/0x2b0
kvm_arch_vcpu_ioctl+0x28c/0x4b8
kvm_vcpu_ioctl+0x4bc/0x7a8
__arm64_sys_ioctl+0xb4/0x100
invoke_syscall+0x70/0x100
el0_svc_common.constprop.0+0x48/0xf0
do_el0_svc+0x24/0x38
el0_svc+0x3c/0x158
el0t_64_sync_handler+0x120/0x130
el0t_64_sync+0x194/0x198 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-r7mg-69gq-5g8v | Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.Please note this vulnerability is similar, but not identical to CVE-2023-52327. | []
| null | 6.1 | null | null |
|
GHSA-29f8-5v89-7j3x | An incorrect type conversion vulnerability exists in the DVPSSoftcopyVOI_PList::createFromImage functionality of OFFIS DCMTK 3.6.8. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | []
| null | 7.5 | null | null |
|
GHSA-mmj4-93w9-45fr | Reflected XSS in admin/edit-comment.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to inject arbitrary web script or HTML via the GET parameter p. | []
| null | 4.8 | null | null |
|
CVE-2019-15774 | The nd-booking plugin before 2.5 for WordPress has a nopriv_ AJAX action that allows modification of the siteurl setting. | [
"cpe:2.3:a:booking_project:booking:*:*:*:*:*:wordpress:*:*"
]
| null | null | 6.1 | 5.8 |
|
CVE-2020-6093 | An exploitable information disclosure vulnerability exists in the way Nitro Pro 13.9.1.155 does XML error handling. A specially crafted PDF document can cause uninitialized memory access resulting in information disclosure. In order to trigger this vulnerability, victim must open a malicious file. | [
"cpe:2.3:a:gonitro:nitro_pro:13.9.1.155:*:*:*:*:*:*:*"
]
| null | null | 6.5 | null |
|
CVE-2022-33877 | An incorrect default permission [CWE-276] vulnerability in FortiClient (Windows) versions 7.0.0 through 7.0.6 and 6.4.0 through 6.4.8 and FortiConverter (Windows) versions 6.2.0 through 6.2.1, 7.0.0 and all versions of 6.0.0 may allow a local authenticated attacker to tamper with files in the installation folder, if FortiClient or FortiConverter is installed in an insecure folder. | [
"cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticonverter:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticonverter:6.2.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticonverter:6.2.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticonverter:7.0.0:*:*:*:*:windows:*:*"
]
| null | 6.8 | null | null |
|
GHSA-hp87-jr7m-7m74 | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBS40V before 2.6.1.4, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25. | []
| null | null | null | null |
|
GHSA-fc4m-r3qf-679q | Rejected reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. | []
| null | null | null | null |
|
CVE-2012-4771 | Multiple cross-site scripting (XSS) vulnerabilities in Subrion CMS before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the id parameter to (1) admin/accounts/, (2) admin/manage/, or (3) admin/manage/blocks/edit/; or (4) group parameter to admin/configuration/. NOTE: The f[accounts][fullname] and f[accounts][username] vectors are covered in CVE-2012-5452. | [
"cpe:2.3:a:intelliants:subrion_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intelliants:subrion_cms:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:intelliants:subrion_cms:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:intelliants:subrion_cms:2.2.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2024-20504 | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerabilities | A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. | []
| null | 5.4 | null | null |
GHSA-9q79-fjpr-c8vh | PHPGurukul hostel-management-system 2.1 allows XSS via Guardian Name, Guardian Relation, Guardian Contact no, Address, or City. | []
| null | 5.4 | null | null |
|
CVE-2022-1725 | NULL Pointer Dereference in vim/vim | NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4959. | [
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
| null | null | 6.6 | null |
GHSA-468h-qqc5-v34c | Insecure direct object reference in SUNNY TRIPOWER 5.0 Firmware version 3.10.16.R leads to unauthorized user groups accessing due to insecure cookie handling. | []
| null | 8.1 | null | null |
|
CVE-2024-28009 | Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN MR02LN, WG1810HP(JE) and WG1810HP(MF) all versions allows a attacker to execute an arbitrary command with the root privilege via the internet. | [
"cpe:2.3:a:nec_corporation:wg1200hp3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wf300hp2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg2200hp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wf300hp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8750n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8170n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1800hp3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:w1200ex\\/ms\\/:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:mr01ln:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:w300p:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wf1200hp2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1800hp2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg300hp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1800hp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8160n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8700n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8100n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr7870s:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wm3450rn:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wm3600r:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:mr02ln:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1810hp\\/je\\/:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wf800hp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wf1200hp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr9500n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8300n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:cr2500p:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr6670s:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr7800h:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wm3500r:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wm3800r:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1810hp\\/mf\\/:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1200hs3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1200hs2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1400hp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8600n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8150n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8500n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8400n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8200n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1200hs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg600hp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8175n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8370n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr4100n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr7850s:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8166n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr4500n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1900hp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1200hp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr8165n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr9300n:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr1200h:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr6650s:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wr6600h:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wm3400rn:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nec_corporation:wg1900hp2:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2023-38949 | An issue in a hidden API in ZKTeco BioTime v8.5.5 allows unauthenticated attackers to arbitrarily reset the Administrator password via a crafted web request. | [
"cpe:2.3:a:zkteco:biotime:8.5.5:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2009-3542 | Directory traversal vulnerability in ls.php in LittleSite (aka LS or LittleSite.php) 0.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the file parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL. | [
"cpe:2.3:a:kneuro:littlesite.php:0.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-hrcv-2p36-pwrv | SQL injection vulnerability in includes/functions in FreeDomain.co.nr Clone allows remote attackers to execute arbitrary SQL commands via the logindomain parameter to members.php. | []
| null | null | null | null |
|
CVE-2023-41453 | Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the cmd parameter in the index.php component. | [
"cpe:2.3:a:phpkobo:ajaxnewsticker:1.0.5:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-q2wj-pp48-fpgj | Roundcube 1.5.x before 1.5.6 and 1.6.x before 1.6.5 allows XSS via a Content-Type or Content-Disposition header (used for attachment preview or download). | []
| null | 6.1 | null | null |
|
CVE-2006-3405 | Cross-site scripting (XSS) vulnerability in qtofm.php in QTOFileManager 1.0 allows remote attackers to inject arbitrary web script or HTML via the (1) delete, (2) pathext, and (3) edit parameters. | [
"cpe:2.3:a:qto:qtofilemanager:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 5.8 |
|
GHSA-cmwr-vqmv-jhwm | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in vCita.Com Online Booking & Scheduling Calendar for WordPress by vcita allows Reflected XSS.This issue affects Online Booking & Scheduling Calendar for WordPress by vcita: from n/a through 4.4.2. | []
| null | 7.1 | null | null |
|
GHSA-q3xq-vqcx-9724 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA Forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13162. | []
| null | null | null | null |
|
CVE-2024-43472 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
]
| null | 5.8 | null | null |
CVE-2013-0760 | Buffer overflow in the CharDistributionAnalysis::HandleOneChar function in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-79rp-v9rm-gxm8 | FastChat Denial of Service vulnerability | A Denial of Service (DoS) vulnerability exists in the file upload feature of lm-sys/fastchat version 0.2.36. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. An attacker can exploit this by sending a payload with an excessively large filename, causing the server to become overwhelmed and unavailable to legitimate users. | []
| null | null | 7.5 | null |
GHSA-48vq-m47w-3x7g | SQL injection vulnerability in product.html in B2B Gold Script allows remote attackers to execute arbitrary SQL commands via the id parameter. | []
| null | null | null | null |
|
CVE-2018-15680 | An issue was discovered in BTITeam XBTIT 2.5.4. The hashed passwords stored in the xbtit_users table are stored as unsalted MD5 hashes, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack. | [
"cpe:2.3:a:btiteam:xbtit:2.5.4:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 5 |
|
CVE-2020-14195 | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity). | [
"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*"
]
| null | 8.1 | null | 6.8 |
|
CVE-2022-30466 | joyebike Joy ebike Wolf Manufacturing year 2022 is vulnerable to Authentication Bypass by Capture-replay. | [
"cpe:2.3:o:joybike:wolf_firmware:2022:*:*:*:*:*:*:*",
"cpe:2.3:h:joybike:wolf:-:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 3.3 |
|
GHSA-mr4m-8vj4-5c74 | Cross-site scripting (XSS) vulnerability in the Automated Logout module 6.x-1.x before 6.x-1.7 and 6.x-2.x before 6.x-2.3 for Drupal allows remote authenticated users with administer autologout privileges to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null |
|
CVE-2020-3477 | Cisco IOS and IOS XE Software Information Disclosure Vulnerability | A vulnerability in the CLI parser of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker to access files from the flash: filesystem. The vulnerability is due to insufficient application of restrictions during the execution of a specific command. An attacker could exploit this vulnerability by using a specific command at the command line. A successful exploit could allow the attacker to obtain read-only access to files that are located on the flash: filesystem that otherwise might not have been accessible. | [
"cpe:2.3:o:cisco:ios:16.3.11:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:2610xm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:2611xm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:2612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:2620xm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:2621xm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:2650xm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:2651xm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:2691:-:*:*:*:*:*:*:*"
]
| null | null | 5.5 | null |
GHSA-4vx9-ghq5-84jw | Type Confusion in Spellcheck in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | []
| null | 8.8 | null | null |
|
GHSA-8vx6-f48v-9j84 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | []
| null | null | null | null |
|
CVE-2020-20699 | A cross site scripting (XSS) vulnerability in S-CMS PHP v3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the Copyright text box under Basic Settings. | [
"cpe:2.3:a:s-cms:s-cms:3.0:*:*:*:*:*:*:*"
]
| null | 4.8 | null | 3.5 |
|
GHSA-6w72-x59c-h2c9 | An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane.When an incoming connection was blocked because it exceeded the connections-per-second rate-limit, the system doesn't consider existing connections anymore for subsequent connection attempts so that the connection limit can be exceeded.
This issue affects Junos OS Evolved:All versions before 21.4R3-S4-EVO,22.1-EVO versions before 22.1R3-S3-EVO,22.2-EVO versions before 22.2R3-S2-EVO,22.3-EVO versions before 22.3R2-S1-EVO, 22.3R3-EVO. | []
| 6.9 | 5.3 | null | null |
|
GHSA-7vrx-w4v5-hwph | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve57697. | []
| null | null | 8.8 | null |
|
GHSA-cvfm-v88g-pg7v | A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service. | []
| null | 5.5 | null | null |
|
GHSA-xp7v-ppph-hrqr | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GetButton Chat Button by GetButton.Io plugin <= 1.8.9.4 versions. | []
| null | 5.9 | null | null |
|
CVE-2024-53718 | WordPress Multi Feed Reader plugin <= 2.2.4 - CSRF to Stored Cross Site Scripting (XSS) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Eric Teubert Multi Feed Reader allows Stored XSS.This issue affects Multi Feed Reader: from n/a through 2.2.4. | []
| null | 7.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.